
Loki, starting IOC discovering
Andrea Cavallini - May 2nd, 2024
Today is always more important and significant to be efficient in controlling our own infrastructures; actions to put in place for this verification process shall require both proactive and post-action...

Flipping pages, from userland to godmode
Sergio Corpettini - April 6th, 2024
Traslate: Antonio Piovesan On X, Lau (@notselwyn) (https://twitter.com/notselwyn/) released a blogpost on 26 March at https://pwning.tech/nftables/ describing an elaborate attack on the Linux kernel that allows privilege escalation by exploiting...

Likely Iranian-Origin Phishing Attack: New Threat to Online Security in Italy!
Davide Cavallini - April 4th, 2024
In the vast landscape of computing, increasingly insidious threats emerge that jeopardize the online security of both companies and ordinary users. In this context, phishing attacks represent one of the...

Hunting Hydra: ETA-W1nterSt0rm #OpChildSafety discovers a huge CSAM network
Olivia Terragni - April 2nd, 2024
#OpChildSafety: just as in every story, there is always more than what a reader or a spectator can see and above all know. This is a story is about the...
Sign up for the newsletter